Advanced Materials Research
Vol. 845
Vol. 845
Advanced Materials Research
Vol. 844
Vol. 844
Advanced Materials Research
Vol. 843
Vol. 843
Advanced Materials Research
Vol. 842
Vol. 842
Advanced Materials Research
Vols. 838-841
Vols. 838-841
Advanced Materials Research
Vol. 837
Vol. 837
Advanced Materials Research
Vols. 834-836
Vols. 834-836
Advanced Materials Research
Vol. 833
Vol. 833
Advanced Materials Research
Vol. 832
Vol. 832
Advanced Materials Research
Vol. 831
Vol. 831
Advanced Materials Research
Vol. 830
Vol. 830
Advanced Materials Research
Vol. 829
Vol. 829
Advanced Materials Research
Vol. 828
Vol. 828
Advanced Materials Research Vols. 834-836
Paper Title Page
Abstract: more and more people are used to purchase online. And companies also want to pay for the keyword on big search engine, such as Baidu, Google. So the strength of the competition plays a significant role in the efficiency of an online advertising campaign. Models for keyword auctions usually assume that, the value of a click is fixed and independent of the other sponsored ads in the auctions result, for the advertiser. In china, the big Online shopping mallTmall. Consumers can search products and service through Tmall Search Engine, a search engine allows consumers search in the Tmall. And we employ a zero-inflated Poisson regression to model the conversion of keywords.
1803
Abstract: A method is proposed which uses the IBM OmniFind Enterprise Edition combined with IBM open source of unstructured information management architecture of Unstructured Information Management Architecture (UIMA), to realize the IBM OmniFind Enterprise Edition semantic search engine search and result classification. This method makes the search space and function more widely, which can not only meet the higher demand of the part of the user, but also increase the competitiveness of the client application.
1807
Abstract: Test data generation is key of software testing. Test data methods based on program executing overcomes the problem that static methods limit tested procedure, which shows some advantages, but program executing methods need support of searching algorithm. This paper presents the searching algorithm based on dynamic data, it judges speedily adjustment rang of variables of tested procedure, does not try to search step by step and improves efficiency of test data generation..
1812
Abstract: The talent training program is an important part of professional construction. Our college passed survey analysis and used the O-ring theory to train the talents who were badly needed and to reform and innovate traditional training mode with the analysis of enterprise professional ability and the professional construction thought that took employment demand as guide, took professional ability as principal line and took vocational sustainable development as fundament. All of these brought about an all-round development to skillful persons.
1816
Abstract: At present the mainstream way of exploiting application system is to use hierarchical structure, of which the most popular way is three-tier architecture of Web project development. While the problem is that .net platform have large amount of information and hardly to search any useful information. So this paper puts forward an improved MCN framework based on the traditional three-layer architecture pursuit of hierarchical design and a modular development approach, it solve the problem of large amount of code and low efficiency of database interaction in the traditional three-layer structure.
1820
Abstract: Opinion mining aims at extracting information which is from Internet or documents and useful for human beings. We analyze five opinion mining methods and compare these methods from the aspects of mining granularity, automation, input, defect, the scope of application. Finally, we point out our future work.
1824
Abstract: Convergence of wavelet expansions of a function f at generalized continuous points is discussed. By approximation method, its proved that the wavelet expansions of f converge to the mean value of the left and the right limits of f at a generalized continuous point. As an application, the result that the wavelet expansions of a function f converge at a continuous point is generalized.
1828
Abstract: In the framework of the virtual machine can be well applied to cloud computing platforms such as multi-level security environment for guest virtual machines and communication between the fine-grained access control to prevent malicious software attacks and the spread between the guest virtual machine. This paper presents a set of virtual machines framework for assurance in the cloud computing software services in the guest virtual machines user-level application security.
1832
Abstract: Let (X,f) be a compact system. In this note we prove that if f satisfies Lipschitz condition, then f is totally weakly chain transitive if and only if f is weakly chain transitive by introducing the notion of the weak chain transitivity and the totally weak chain transitivity. The note also proves that the set-valued map of f is weakly chain transitive implies f is weakly chain transitive.
1836
Abstract: In order to meet the requirements of E-Government System with complex user relationships and diversified business process , this paper proposed an advanced RBAC model named Group Hierarchy Role-Based Access Control (GH-RBAC). In this model, tradition user role assignment have been reformed to multilayer user group role group assignment which improve the scalability and adaptability of access control. Finally, we design and implement the extend model which emphasis the way to carry out access control module with the low coupling.
1840